SECURITY ALERTS

Microsoft Release May 2023 Security Update Including 3 Zero-Day Vulnerabilities (CVE-2023-29325, CVE-2023-29336, and CVE-2023-24932) and 2 High-Risk Vulnerabilities (CVE-2023-24941 and CVE-2023-24943)

DESCRIPTION:
Microsoft released the new patches about 3 zero-day vulnerabilities and 2 CVSS 9.8 vulnerabilities in May 2023 Security Update.
1. CVE-2023-29325(CVSS 8.1): This vulnerability allows an attacker to execute their code on an affected system by sending a specially crafted RTF e-mail.
2. CVE-2023-29336(CVSS 7.8): This vulnerability listed as being under active attack at the time of release, win32k privilege escalation is usually combined with a code execution bug to spread malware.
3. CVE-2023-24932(CVSS 6.7): Secure Boot Security Feature Bypass Vulnerability
4. CVE-2023-24941(CVSS 9.8): This vulnerability allows a remote, unauthenticated attacker to run arbitrary code on an affected system with elevated privileges. No user interaction is required. This vulnerability is that exists in NFS version 4.1.
5. CVE-2023-24943(CVSS 9.8): Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

 

AFFECTED RELEASES:
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)

 

SOLUTION:
1. Users and system administrators of affected products are advised to apply the security updates by the following URL:
(1) https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29325
(2) https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29336
(3) https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24932
(4) https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24941
(5) https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24943

 

REFERENCE:
1. https://www.zerodayinitiative.com/blog/2023/5/8/the-may-2023-security-update-review
2. https://www.ithome.com.tw/news/156822
3. https://msrc.microsoft.com/update-guide/releaseNote/2023-May
4. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29325
5. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29336
6. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24932
7. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24941
8. https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24943

Back To Top